Using Data Analytics to Detect Fraud. Other Data Analysis Techniques
|
|
- Rosamond Farmer
- 7 years ago
- Views:
Transcription
1 Using Data Analytics to Detect Fraud Other Data Analysis Techniques
2 Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is the process used to collect and analyze unstructured data. It requires extreme organization, as data sets tend to be quite large. It is best used in conjunction with quantitative data analysis.
3 Textual Analytics Analysis of unstructured, text-based data for keywords that reveal patterns, sentiments, and relationships indicative of fraud Uses linguistic technologies, statistical techniques, and scoring algorithms to categorize and analyze textual data Requires: Sophisticated software Thorough understanding of the legal issues regarding employee rights and workplace searches
4 Textual Analytics Data Sources Voice files News feeds Instant messages User documents Social media posts Apps Presentations Video Sales and marketing
5 Textual Analytics Emotive tone derogatory, surprised, secretive, angry, worried, or confused communications Ethical behavior harassing, secretive, cursing Concept, entity, relationship, or event extraction Text link analysis Social network analysis
6 Developing a List of Keywords Keywords depend on industry, relevant fraud risks, and data set. Use fraud triangle as reference. Deadline Quota Short Problem Concern Reasonable Deserve Borrow Therefore Override Write off Adjust Discount
7 Visual Analytics Some data sets are so vast or complex that they are difficult to analyze using traditional means. Visual analytics can help identify patterns or anomalies in such data.
8 Word Clouds Risky Creative jobs Uncertainty unbalanced Weak delay moderate Liability overstate critical audit accrual strategy
9 Heat Maps
10 Tree Maps Accounting Accounts Payable Information Technology Financial Misstatement Penalties and Fines Thefts of Assets Fraudulent Disbursements System Failures Reputation Risk Research and Development Financial Misstatement Sales Financial Misstatement Fraudulent Disbursements Theft of Assets Natural Disasters Administrative Reputation Risk Penalties and Fines Natural Disasters System Failures Theft of Assets Fraudulent Disbursements Reputation Risk Theft of Assets Fraudulent Disbursements
11 Link Analysis
12 Geospatial Analysis
13 Timeline Analysis Highlight key times, dates, and facts. More readily determine a sequence of events. Analyze multiple or concurrent sequences of events. Track unaccounted-for time. Identify inconsistencies or impossibilities in data.
14 Conflict Checking Use of specialized software to identify potentially problematic relationships: Conflicts of interest on a company s board of directors Relationships between potential new hires and business units Vendors that operate from addresses that previously have been associated with fraud Vendors that are not listed in any online commercial database or that are listed on government excluded party lists
15 Log-In Monitoring Software Used to identify anomalies in log-ins to company system: Unusual times or days Unusual locations Excessive log-ins Unauthorized log-ins
16 Employee Risk Ranking Brings together big data both structured and unstructured data to identify and monitor highrisk employees Aggregates all tests and analytics into dashboard Similar analysis can be performed for vendors or customers Data privacy and employee rights are integral concerns
17 Employee Risk Ranking Example 1. Keywords Percentage of keywords around pressure, opportunity, and rationalization in and IM communications Scaling: 3 2. T&E analysis Ranking of T&E out-of-compliance hits and overall scoring Scaling: 3 3. Sales activity Ranking of sales activity, field notes, and sales returns and allowances Scaling: 4 4. User activity 5. Third-party risk 6. Alias clustering 7. Emotive tone Percentage of instances within period where custodian sends or receives information involving those outside of peer group, as identified through hierarchies Instances where employee is linked to high-risk third parties (e.g., customers, vendors, state-owned entities, etc.) in , T&E, or sales activity Percentage of instances within that week where custodian sends or receives ESI involving at least one of their identified communicative aliases Percentage of instances where the employee sends or receives ESI with negative emotions (angry, frustrated, secretive, etc.) identified through linguistic analyses Scaling: 2 Scaling: 2 Scaling: 3 Scaling: 5 Custodian C1 C2 C3 C4 C5 C6 C7 Scaling C1 Scaling C2 Scaling C3 Scaling C4 Scaling C5 Scaling C6 Scaling C7 Score A, Week A, Week
18 Transaction Risk Scoring Brings multiple analytics together Monitors and scores transactions based on number of breaches: Round-dollar amounts Incomplete invoice Keyword in payment description field Can apply weights to certain tests to influence the overall risk score
Taking Data Analytics to the Next Level
Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,
More informationDemystifying Big Data Analytics
Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components
More informationInvestigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
More informationFraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationEmerging Trends in Fraud Analytics:
Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent
More informationSocial Media Monitoring, Planning and Delivery
Social Media Monitoring, Planning and Delivery G-CLOUD 4 SERVICES September 2013 V2.0 Contents 1. Service Overview... 3 2. G-Cloud Compliance... 12 Page 2 of 12 1. Service Overview Introduction CDS provide
More informationFraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
More informationLGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
More informationINTERNATIONAL STANDARD ON REVIEW ENGAGEMENTS 2410 REVIEW OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY CONTENTS
INTERNATIONAL STANDARD ON ENGAGEMENTS 2410 OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY (Effective for reviews of interim financial information for periods beginning
More informationTypes of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
More informationText Analytics Beginner s Guide. Extracting Meaning from Unstructured Data
Text Analytics Beginner s Guide Extracting Meaning from Unstructured Data Contents Text Analytics 3 Use Cases 7 Terms 9 Trends 14 Scenario 15 Resources 24 2 2013 Angoss Software Corporation. All rights
More informationU S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationHow ediscovery Technology Can Accelerate Information Governance for Corporations
Nuix Insight Paper How ediscovery Technology Can Accelerate Information Governance for Corporations With risk management and operational efficiencies becoming strategic priorities for both private and
More informationSecrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining
Secrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining Shauna Woody-Coussens Director, Forensic & Valuation Services Jeremy Clopton Manager, Forensic & Valuation Services Agenda Fraud
More informationThe auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
More informationLEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013
LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY Bill Franks Chief Analytics Officer Teradata July 2013 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For
More informationFraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
More informationPredictive Customer Intelligence
Sogeti 2015 Damiaan Zwietering zwietering@nl.ibm.com Predictive Customer Intelligence Customer expectations are driving companies towards being customer centric Find me Using visualization and analytics
More informationTITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
More informationManaging data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
More informationIntegrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
More informationFRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
More informationText Mining - Scope and Applications
Journal of Computer Science and Applications. ISSN 2231-1270 Volume 5, Number 2 (2013), pp. 51-55 International Research Publication House http://www.irphouse.com Text Mining - Scope and Applications Miss
More informationREGULATORY COMPLIANCE SOFTWARE SOLUTIONS. Dynamic Solutions. Superior Results.
REGULATORY COMPLIANCE SOFTWARE SOLUTIONS Dynamic Solutions. Superior Results. TOOLS THAT REDUCE THE BURDEN OF MANAGING COMPLIANCE AND THE RISK OF NON-COMPLIANCE WATCHDOG ELITE PLATFORM, a holistic platform
More informationwww.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More information1. Overview of audits and reviews of financial statements
1. Overview of audits and reviews of financial statements 1. Overview of audits and reviews of financial statements 1:2 Introduction to the chapter 1:2 What is an audit? 1:2 What is a review? 1:3 Australian
More informationDescription of the ten core competencies
Description of the ten core competencies You can use this document as a reference when assessing competency development on the Competency Assessment form. Introduction to competencies Competencies are
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationFraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
More informationERM Symposium April 2009. Moderator Nancy Bennett
ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented
More informationINTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
More informationUsing Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
More informationHOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES The Office of the Government Chief Information Officer of The Government of the Hong Kong Special Administrative Region issued its IT Security
More informationEnterprise Risk Management (ERM) & Compliance
Enterprise Risk Management (ERM) & Compliance Mid Atlantic Regional Meeting, May 1, 2015 Society of Corporate Compliance and Ethics Jason Lunday, consultant Compliance Opportunities in ERM Increase compliance
More informationSocial Business Intelligence For Retail Industry
Actionable Social Intelligence SOCIAL BUSINESS INTELLIGENCE FOR RETAIL INDUSTRY Leverage Voice of Customers, Competitors, and Competitor s Customers to Drive ROI Abstract Conversations on social media
More informationDriving business performance Using data analytics
Driving business performance Using data analytics January 2016 kpmg.com About data analytics Many companies are overlooking a significant opportunity to enhance decision making and improve performance
More informationISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
More informationACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL
ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL STATE BOARD OF ACCOUNTS 302 West Washington Street Room E418 Indianapolis, Indiana 46204-2769 Issued January 2011 Revised April 2012 TABLE OF CONTENTS
More informationFraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
More informationAccounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.
Whitepaper Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing. June 2014 Overview Reducing costs, improving performance,
More informationTHIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s
MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationBusiness Conduct, Compliance and Ethics Program. important
Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the
More informationFraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be
Fraud Checklist Client Name Disclosing entity Prepared by Reviewed by Partner review Balance Date Close Monitoring Date Date Date How to use this checklist An initial assessment of the risk that irregularities
More informationTransmittal Letter... 1. Objectives and Scope... 2. Approach... 3-7. Financial System... 8. Permitting Application... 9
Internal Audit Committee of Information Technology Risk Assessment Public Report Prepared By: Internal Auditors of Brevard County September 30, 2009 Table of Contents Transmittal Letter... 1 Objectives
More informationData Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
More informationTHE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER
THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.
More informationChapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
More informationIT28 GOING PAPERLESS WITH MICROSOFT DYNAMICS NAV 2016. Tom Taylor, Microsoft
IT28 GOING PAPERLESS WITH MICROSOFT DYNAMICS NAV 2016 Tom Taylor, Microsoft YOUR PRESENTER Tom Taylor Partner Technology Strategist, Microsoft 12 years experience Dynamics NAV NAVUG member 9 years 2 SESSION
More informationEmployee Benefit Plans Financial Statement Audits
Employee Benefit Plans Financial Statement Audits Plan Advisory The AICPA EBPAQC is a firm-based, volunteer membership center created with the goal of promoting quality employee benefit plan audits. Center
More informationUnderstanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
More informationSocial Media Implementations
SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.
More informationIBM SPSS Modeler Premium
IBM SPSS Modeler Premium Improve model accuracy with structured and unstructured data, entity analytics and social network analysis Highlights Solve business problems faster with analytical techniques
More informationHow to achieve excellent enterprise risk management Why risk assessments fail
How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.
More informationPlan for the audit of the 2011 financial statements
INTERNATIONAL TRAINING CENTRE OF THE ILO Board of the Centre 73rd Session, Turin, 3-4 November 2011 CC 73/5/2 FOR INFORMATION FIFTH ITEM ON THE AGENDA Plan for the audit of the 2011 financial statements
More informationCYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY
CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2015 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe has once again collaborated with Advisen to conduct a comprehensive
More informationAutonomy Consolidated Archive
Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain
More informationBig Data: Key Concepts The three Vs
Big Data: Key Concepts The three Vs Big data in general has context in three Vs: Sheer quantity of data Speed with which data is produced, processed, and digested Diversity of sources inside and outside.
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationCHAPTER 7 PLANNING THE AUDIT: IDENTIFYING AND RESPONDING TO THE RISKS OF MATERIAL MISSTATEMENT
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 7 PLANNING THE AUDIT: IDENTIFYING AND RESPONDING TO THE
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationDirect-to-Company Feedback Implementations
SEM Experience Analytics Direct-to-Company Feedback Implementations SEM Experience Analytics Listening System for Direct-to-Company Feedback Implementations SEM Experience Analytics delivers real sentiment,
More informationFORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01
FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources...
More informationConsideration of Laws and Regulations in an Audit of Financial Statements
Consideration of Laws and Regulations 193 AU-C Section 250 Consideration of Laws and Regulations in an Audit of Financial Statements Source: SAS No. 122. Effective for audits of financial statements for
More informationFederal Financial Accounting and Auditing. Technical Release 3 (Revised) Federal Accounting Standards Advisory Board
under the Federal Credit Reform Act Amendments to Technical Release 3: Preparing and Auditing Direct Loan and Loan Guarantee Subsidies under the Federal Credit Reform Act Federal Financial Accounting and
More informationThe impact of the personal data security breach notification law
ICTRECHT The impact of the personal data security breach notification law On 1 January 2016 legislation will enter into force in The Netherlands requiring organisations to report personal data security
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),
More informationRisk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
More informationPr a c t i c a l Litigator s Br i e f Gu i d e t o Eva l u at i n g Ea r ly Ca s e
Ba k e Offs, De m o s & Kicking t h e Ti r e s: A Pr a c t i c a l Litigator s Br i e f Gu i d e t o Eva l u at i n g Ea r ly Ca s e Assessment So f t wa r e & Search & Review Tools Ronni D. Solomon, King
More informationHexaware E-book on Predictive Analytics
Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationImproving Sarbanes-Oxley Compliance with Vendavo Enteprise Pricing Suite
Improving Sarbanes-Oxley Compliance with Vendavo Enteprise Pricing Suite With increasing focus on Companies have rightly focused significant attention and resources on improving their oversight and compliance
More informationBest Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
More informationAudit Guide for Audit Committees of Small Nonprofit Organizations
Audit Guide for Audit Committees of Small Nonprofit Organizations A free resource provided by the Virginia Society of Certified Public Accountants Audit Guide for Small Nonprofit Organizations A free resource
More information2H 2015 SHADOW DATA REPORT
2H 20 SHADOW DATA REPORT Shadow Data Defined: All potentially risky data exposures lurking in cloud apps, due to lack of knowledge of the type of data being uploaded and how it is being shared. Shadow
More informationThe Informatica Solution for Improper Payments
The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade
More informationImplementation Tool for Auditors
Implementation Tool for Auditors CANADIAN AUDITING STANDARDS (CAS) APRIL 2015 STANDARD DISCUSSED CAS 240, The auditor s responsibilities relating to fraud in an audit of financial statements Testing Journal
More informationNeil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
More informationMoving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director
www.pwc.com Moving your enterprise systems to the cloud? What do you need to know to manage the risks? November 2015 Jamie Levitt, Director Disclaimer Certain matters reviewed today may represent services
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationDon t Originate in the Dark: Shine Some Light on Your Third-Party Senders and Their Originators
Don t Originate in the Dark: Shine Some Light on Your Third-Party Senders and Their Originators This ACH risk management white paper examines the risks related to ACH transactions processed by Third-Party
More informationOCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
More informationwww.hcltech.com Get Ready for Tomorrow, Today. Redefine Your Security Intelligence
www.hcltech.com Get Ready for Tomorrow, Today. Redefine Your Security Intelligence Balancing Accessibility and Risk The challenge before enterprises is to provide accessibility and protect their online
More informationData Analytics Leveraging Data Visualization and Automation in Audit Real World Examples
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics
More informationSTAR WARS AND THE ART OF DATA SCIENCE
STAR WARS AND THE ART OF DATA SCIENCE MELODIE RUSH, SENIOR ANALYTICAL ENGINEER CUSTOMER LOYALTY Original Presentation Created And Presented By Mary Osborne, Business Visualization Manager At 2014 SAS Global
More informationCovered Areas: Those EVMS departments that have activities with Covered Accounts.
I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with
More informationTax Fraud in Increasing
Preventing Fraud with Through Analytics Satya Bhamidipati Data Scientist Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved. 2 Tax Fraud in Increasing 27%
More informationSarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
More informationUnderstanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners
Understanding It s Me 247 Security A Guide for our Credit Union Clients and Owners October 2, 2014 It s Me 247 Security Review CU*Answers is committed to the protection of you and your members. CU*Answers
More informationGuided Reading 9 th Edition. informed consent, protection from harm, deception, confidentiality, and anonymity.
Guided Reading Educational Research: Competencies for Analysis and Applications 9th Edition EDFS 635: Educational Research Chapter 1: Introduction to Educational Research 1. List and briefly describe the
More informationUsing Social Media to Grow Your Brand. www.parkerwhite.com life@parkerwhite.com we give brands life
Using Social Media to Grow Your Brand www.parkerwhite.com life@parkerwhite.com we give brands life INTRODUCTION: Why Social Media? Social media is powerful because of its authenticity people take messages
More informationChapter 6. Foundations of Business Intelligence: Databases and Information Management
Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:
More informationThe Danielson Group Behavior Specialists
RUBRIC FOR BEHAVIOR SPECIALISTS DOMAIN 1: PLANNING AND PREPARATION L E V E L O F P E R F O R M A N C E COMPONENT UNSATISFACTORY NEEDS IMPROVEMENT (BASIC) PROFICIENT DISTINGUISHED 1a: Demonstrating knowledge
More informationExecutive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
More informationCITY OF BURLINGTON COSO FRAMEWORK & COMPLIANCE
CITY OF BURLINGTON COSO FRAMEWORK & COMPLIANCE Points of Focus Principle 1. The organization demonstrates a commitment to integrity and ethical values. Supporting Points of Focus:* Sets the tone at the
More informationExpert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context
Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context 12 th Fraud Seminar December 1, 2015 Presented by: Deniz Appelbaum Abdullah Al-Awadhi Knowledge Based Expert
More informationSolving the Problem of Data Silos: Process and Architecture
I NTE RS YS TE M S W HI TE PAPER Solving the Problem of Data Silos: Process and Architecture Run risk, compliance, and fraud detection applications on a comprehensive, global, and always up-to-date data
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More information